Snort mailing list archives
Quick rule optimize request
From: James Lay <jlay () slave-tothe-box net>
Date: Tue, 17 Jul 2012 10:07:22 -0600
Hey all,
Here's the rule:
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any
(msg:"INDICATOR-COMPROMISE possible WordPress head injection";
content:"add_action"; content:"wp_head"; content:"check_wp_head_load";
file_data; fast_pattern; classtype:bad-unknown; sid:10000015; reference:
blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head; rev:1;)
Chances are bad guys will change the function name, but other then that
we'll see. This should match:
@add_action("wp_head", "check_wp_head_load", mt_rand(1, 6));
But I don't have any packet caps to test this out on. Anyone have any
input on this? Add some within entries perhaps? Anyone have a pcap of
this? Thanks all.
James
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org
Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Quick rule optimize request James Lay (Jul 17)
- Re: Quick rule optimize request Joel Esler (Jul 17)
- Message not available
- Re: Quick rule optimize request James Lay (Jul 17)
- Message not available
- Re: Quick rule optimize request Joel Esler (Jul 17)
